Our IT glossary contains all the related terminology specific to IT and Microsoft Applications
Acronis Backup is designed to safeguard critical data, applications, and systems from data loss, cyber threats, and other disasters.
Active Directory (AD) is a directory service that functions as a centralised and standardised system for managing and organising information.
Microsoft Azure is a comprehensive cloud computing platform empowering businesses to build, deploy, and manage applications and services.
Azure Virtual Desktop (AVD)
Azure Virtual Desktop is a cloud-based desktop and application virtualisation service. It enables users to access a virtualised Windows experience from virtually any device.
Azure Virtual WAN
Azure Virtual WAN is a networking service provided by Microsoft Azure, offering a streamlined and automated solution for connecting branch offices, data centres, and the Azure cloud.
Secure backup systematically and securely copies and stores data to facilitate recovery in case of accidental deletion, data corruption, hardware failure, or other unforeseen events.
Business Continuity Plan (BCP)
Business Continuity Planning (BCP) refers to an organisation's capability to maintain critical functions, operations, and services during and after disruptions or emergencies.
Cisco Meraki Networking
Cisco Meraki is a cloud networking platform that includes wireless access points, cloud-managed switches, SD-WAN solutions, endpoint management, and location analytics.
Cloud backup refers to the practice of securely storing copies of important data and files in an offsite server or data centre hosted by a third-party service provider.
Cloud computing provides computing services over the internet, eliminating the need for physical hardware ownership. The benefits of cloud computing are substantial.
Cloud migration is the process of transferring digital assets, including data, applications, and IT processes, from on-premises infrastructure to a cloud computing environment.
Cyber Essentials is a robust, government-endorsed initiative designed to safeguard businesses of all sizes from a diverse range of common cyber threats.
Cyber Essentials Plus
Cyber Essentials Plus involves a two-step process: initiating the online assessment and undergoing a subsequent technical systems audit by an accredited assessor.
Cyber security is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
Cyber Security Audit
A cyber security audit systematically reviews an organisation's information systems, processes and policies to assess cybersecurity measures.
Dark Web Monitoring
Dark Web Monitoring proactively searches information circulating on the dark web. This involves identifying compromised or leaked data and other highly sensitive information.
Microsoft Defender is a comprehensive antivirus and anti-malware software designed to provide real-time protection against various threats.
Disaster recovery encompasses a comprehensive set of strategies and processes geared towards the swift and efficient restoration of IT systems, data, and operations following a disruptive event.
Microsoft Dynamics 365 is a suite of intelligent business applications, integrating Customer Relationship Management (CRM) and Enterprise Resource Planning (ERP).
Edge security is focused on protecting the entry and exit points of a network, where data traffic enters or leaves an organisation.
Email security involves implementing measures to safeguard email communication systems from cyber threats and unauthorised access.
Endpoint protection involves safeguarding devices equipped with a security client from potential malicious threats and cyberattacks.
Enterprise Mobility Management (EMM)
Enterprise Mobility Management (EMM) is the set of technologies, processes, and policies designed to manage and secure mobile devices, networks, and applications within a business.
Ethernet is a technology used for connecting computers, servers, routers, switches, and other network devices within a local area network (LAN) in a larger network infrastructure.
Exclaimer manages Exchange signatures across various devices. It seamlessly incorporates signatures into all emails processed through Exchange, regardless of the email client or the device used.
A firewall is a network security system designed to monitor, control, and manage incoming and outgoing network traffic based on predetermined security rules.
Firmware is a software that is embedded in electronic devices to control and manage the device's specific hardware.
Hybrid backup refers to a data backup strategy that combines elements of both local (on-premises) and cloud-based backup solutions.
Infrastructure as a Service
Infrastructure as a Service (IaaS) is a cloud computing model that provides virtualised computing resources over the internet.
IT consultancy refers to the professional service provided by experts in the field of information technology to assist organisations in leveraging technology to achieve their business objectives.
IT Glue is a cloud-based IT documentation platform designed to help managed service providers (MSPs) and IT professionals organise, centralise and streamline their IT documentation.
IT governance refers to the framework of policies, processes, and decision-making structures that guide and ensure the effective and efficient use of information technology (IT) within an organisation.
IT infrastructure is the collection of hardware, software, networks, facilities, and other components that support the overall operation and functionality of an organisation's IT environment.
IT outsourcing refers to the practice of contracting out certain information technology functions or services to external service providers.
IT Service Desk
An IT service desk, also known as a help desk, serves as a centralised point of contact within an organisation, providing support and assistance to end-users facing IT-related issues or service requests.
An IT strategy is a comprehensive plan outlining how an organisation will use information technology to achieve its business objectives.
Malware, short for malicious software, refers to any software specifically designed to harm, exploit, or compromise computer systems, networks, or user devices.
Managed Cloud is a cloud computing service where a third-party provider takes responsibility for the management, security, and optimisation of cloud infrastructure on behalf of the client.
Managed IT is when a business chooses to outsourcing their IT infrastructure, support, services, and systems to a third-party provider, known as a Managed Service Provider (MSP).
Managed Service Provider (MSP)
A Managed Service Provider (MSP) is a third-party company that delivers a range of IT services and support to businesses, typically on a subscription or outsourcing model.
Managed Service Security Provider (MSSP)
A Managed Security Service Provider (MSSP) is a specialised third-party company that offers comprehensive cybersecurity services to organisations.
Microsoft 365 is a comprehensive suite of cloud-based productivity tools and services provided by Microsoft.
Microsoft Exchange is a messaging and collaborative platform developed by Microsoft. Applications for email, calendaring, task management, contact management, and more.
Microsoft Solutions Partner
Microsoft Solution Partners possess extensive technical capabilities, a commitment to skill development and training, and a proven track record of in specific Microsoft Cloud solution areas.
Mimecast provides cloud cyber security services that safeguard essential communications, individuals and data ensuring the security of vital information.
Network as a Service (NaaS)
NaaS stands for Network as a Service, a cloud computing model that delivers networking services over the internet.
Outsourced IT is when a business chooses to outsource all or part of their IT function to a Managed Service Provider.
Phishing is a type of cyber attack in which attackers use deceptive techniques to trick individuals into providing sensitive information.
Ransomware is a type of malware designed to encrypt a user's files or lock them out of their computer system, rendering the data inaccessible without a paid ransom.
Remote backup, also known as online or cloud backup, involves securely storing data on an offsite server or cloud platform using the internet.
SD-WAN, short for Software-Defined Wide Area Network, is a virtual architecture designed to empower enterprises with the flexibility to utilise various transport services.
A server is a computer or system that is dedicated to managing and facilitating network resources and services.
SharePoint is a cloud collaboration platform integrated with Microsoft 365. It is used for storing, organising, sharing, and accessing information from any device with a web browser.
Software as a Service (SaaS)
Software as a Service (SaaS) is a cloud computing model that delivers software applications over the internet on a subscription basis.
SoGEA broadband is a type of internet connection that provides high-speed access to the internet and does not include a traditional landline phone service.
Microsoft Teams is a collaboration platform developed by Microsoft as part of its Microsoft 365 suite of productivity tools.
Threat protection is a set of security measures and technologies designed to detect, prevent, and respond to various cyber security threats that can compromise the integrity of information systems and data.
Two Factor Authentication (2FA)
Two-Factor Authentication (2FA) is a security process that requires users to provide two different authentication factors to verify their identity.
A virtual server, also known as a virtual machine, is a software-based emulation of a physical computer.